Jeremiah Blocki

Orcid: 0000-0002-5542-4674

Affiliations:
  • Purdue University, Department of Computer Science, West Lafayette, IN, USA
  • Microsoft Research, Cambridge, MA, USA (former)
  • Carnegie Mellon University, Pittsburgh, PA, USA (former, PhD 2014)


According to our database1, Jeremiah Blocki authored at least 74 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bandwidth-Hard Functions: Reductions and Lower Bounds.
J. Cryptol., June, 2024

The Impact of Reversibility on Parallel Pebbling.
IACR Cryptol. ePrint Arch., 2024

2023
Differentially Private L<sub>2</sub>-Heavy Hitters in the Sliding Window Model.
CoRR, 2023

Confident Monte Carlo: Rigorous Analysis of Guessing Curves for Probabilistic Password Models.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Towards a Rigorous Statistical Analysis of Empirical Password Datasets.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Computationally Relaxed Locally Decodable Codes, Revisited.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Differentially Private $L_2$-Heavy Hitters in the Sliding Window Model.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

On Relaxed Locally Decodable Codes for Hamming and Insertion-Deletion Errors.
Proceedings of the 38th Computational Complexity Conference, 2023

How to Make Your Approximation Algorithm Private: A Black-Box Differentially-Private Transformation for Tunable Approximation Algorithms of Functions with Low Sensitivity.
Proceedings of the Approximation, 2023

2022
DALock: Password Distribution-Aware Throttling.
Proc. Priv. Enhancing Technol., 2022

The Parallel Reversible Pebbling Game: Analyzing the Post-Quantum Security of iMHFs.
IACR Cryptol. ePrint Arch., 2022

Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions.
IACR Cryptol. ePrint Arch., 2022

Using Illustrations to Communicate Differential Privacy Trust Models: An Investigation of Users' Comprehension, Perception, and Data Sharing Decision.
CoRR, 2022

On Explicit Constructions of Extremely Depth Robust Graphs.
Proceedings of the 39th International Symposium on Theoretical Aspects of Computer Science, 2022

Cost-Asymmetric Memory Hard Password Hashing.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

Privately Estimating Graph Parameters in Sublinear Time.
Proceedings of the 49th International Colloquium on Automata, Languages, and Programming, 2022

On the Multi-user Security of Short Schnorr Signatures with Preprocessing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Relaxed Locally Correctable Codes in Computationally Bounded Channels.
IEEE Trans. Inf. Theory, 2021

Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes.
IACR Cryptol. ePrint Arch., 2021

Parallel Quantum Pebbling: Analyzing the Post-Quantum Security of iMHFs.
CoRR, 2021

Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage.
Comput. Secur., 2021

Differentially-Private Sublinear-Time Clustering.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Private and Resource-Bounded Locally Decodable Codes for Insertions and Deletions.
Proceedings of the IEEE International Symposium on Information Theory, 2021

A New Connection Between Node and Edge Depth Robust Graphs.
Proceedings of the 12th Innovations in Theoretical Computer Science Conference, 2021


Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Exponential Lower Bounds for Locally Decodable and Correctable Codes for Insertions and Deletions.
Proceedings of the 62nd IEEE Annual Symposium on Foundations of Computer Science, 2021

DAHash: Distribution Aware Tuning of Password Hashing Costs.
Proceedings of the Financial Cryptography and Data Security, 2021

On the Security of Proofs of Sequential Work in a Post-Quantum World.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

2020
Information Signaling: A Counter-Intuitive Defense Against Password Cracking.
CoRR, 2020

HACCLE: An Ecosystem for Building Secure Multi-Party Computations.
CoRR, 2020

DALock: Distribution Aware Password Throttling.
CoRR, 2020

An Economic Model for Quantum Key-Recovery Attacks against Ideal Ciphers.
CoRR, 2020

Approximating Cumulative Pebbling Cost Is Unique Games Hard.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

Computationally Data-Independent Memory Hard Functions.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

On Locally Decodable Codes in Resource Bounded Channels.
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020

Locally Decodable/Correctable Codes for Insertions and Deletions.
Proceedings of the 40th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2020

2019
On the Multi-User Security of Short Schnorr Signatures.
IACR Cryptol. ePrint Arch., 2019

2018
Just in Time Hashing.
IACR Cryptol. ePrint Arch., 2018

Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions.
IACR Cryptol. ePrint Arch., 2018

Bandwidth-Hard Functions: Reductions and Lower Bounds.
IACR Cryptol. ePrint Arch., 2018

Sustained Space Complexity.
IACR Cryptol. ePrint Arch., 2018

On the Economics of Offline Password Cracking.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Brief Announcement: Relaxed Locally Correctable Codes in Computationally Bounded Channels.
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018

On the Computational Complexity of Minimal Cumulative Cost Graph Pebbling.
Proceedings of the Financial Cryptography and Data Security, 2018

2017
On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i.
IACR Cryptol. ePrint Arch., 2017

Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions.
IACR Cryptol. ePrint Arch., 2017

Optimizing Locally Differentially Private Protocols.
CoRR, 2017

Locally Differentially Private Protocols for Frequency Estimation.
Proceedings of the 26th USENIX Security Symposium, 2017

Towards Human Computable Passwords.
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017

2016
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond.
IACR Cryptol. ePrint Arch., 2016

Differentially Private Password Frequency Lists.
IACR Cryptol. ePrint Arch., 2016

Depth-Robust Graphs and Their Cumulative Memory Complexity.
IACR Cryptol. ePrint Arch., 2016

Towards Practical Attacks on Argon2i and Balloon Hashing.
IACR Cryptol. ePrint Arch., 2016

Efficiently Computing Data-Independent Memory-Hard Functions.
IACR Cryptol. ePrint Arch., 2016

CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Client-CASH: Protecting Master Passwords against Offline Attacks.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Naturally Rehearsing Passwords.
IACR Cryptol. ePrint Arch., 2015

Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Audit Games with Multiple Defender Resources.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Human Computable Passwords.
CoRR, 2014

Set Families with Low Pairwise Intersection.
CoRR, 2014

2013
Optimizing password composition policies.
Proceedings of the fourteenth ACM Conference on Electronic Commerce, 2013

Differentially private data analysis of social networks via restricted sensitivity.
Proceedings of the Innovations in Theoretical Computer Science, 2013

Audit Games.
Proceedings of the IJCAI 2013, 2013

Adaptive Regret Minimization in Bounded-Memory Games.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

GOTCHA password hackers!
Proceedings of the AISec'13, 2013

2012
Audit Mechanisms for Provable Risk Management and Accountable Data Governance.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy.
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012

2011
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Audit Mechanisms for Privacy Protection in Healthcare Environments.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

2010
Resolving the Complexity of Some Data Privacy Problems.
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010


  Loading...